There are currently 9 terms in this directory beginning with the letter A.
An access control approach in which access is mediated based on attributes associated with subjects (requesters) and the objects to be accessed. Each object and subject has a set of associated attributes, such as location, time of creation, access rights, etc. Access to an object is authorized or denied depending upon whether the required (e.g., policy-defined) correlation can be made between the attributes of that object and of the requesting subject. This is done through a structured language called the eXtensible Access Control Markup Language (XACML), which is as easy to read or write as a natural language.
Even known as IT Administrator, he is a member of the organization who is responsible for deploying, maintaining, and securing the organization's IT devices as well as ensuring that deployed devices and their installed software applications conform to the organization's security requirements and providing IT solutions and troubleshooting.
Short for Application Program Interface (API). APIs explains how a program accesses another to transmit data.
A small Java application that is downloaded by an ActiveX or Java-enabled web browser that can be included in an HTML page, much in the same way an image is included in a page. When you use a Java technology-enabled browser to view a page that contains an applet, the applet's code is transferred to your system and executed by the browser's Java Virtual Machine (JVM).
Computer software that performs a task or set of tasks, such as word processing or drawing. Applications are also referred to as programs. In computing, it is available as a software, which is a set of instructions or code written in a program for executing a task or an operation in a computer. Applications play a vital role in a Computer as it is an end-user program that enables the users to do many things in a system.
American Standard Code for Information Interchange, an encoding system for converting keyboard characters and instructions into the binary number code that the computer understands. In ASCII, every letter, number, and punctuation symbol has a corresponding number, or ASCII code. For example, the character for the number 1 has the code 49, capital letter A has the code 65, and a blank space has the code 32. This encoding system not only lets a computer store a document as a series of numbers, but also lets it share such documents with other computers that use the ASCII system.
Authentication is used by a server when the server needs to know exactly who is accessing their information or site. Authentication is used by a client when the client needs to know that the server is system it claims to be. In authentication, the user or computer has to prove its identity to the server or client. Usually, authentication by a server entails the use of a user name and password. Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints. Authentication by a client usually involves the server giving a certificate to the client in which a trusted third party such as Verisign or Thawte states that the server belongs to the entity (such as a bank) that the client expects it to. Authentication does not determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the person or system is.
Authorization is a process by which a server, or a general system, determines if the client has permission to use a resource or access a file. Authorization is usually coupled with authentication so that the server/system has some concept of who the client is that is requesting access. The type of authentication required for authorization may vary; passwords may be required in some cases but not in others. In some cases, there is no authorization; any user may be use a resource or access a file simply by asking for it. Most of the web pages on the Internet require no authentication or authorization.